IL143573A0
(en)
|
1998-12-09 |
2002-04-21 |
Network Ice Corp |
A method and apparatus for providing network and computer system security
|
US6895436B1
(en)
*
|
1999-07-01 |
2005-05-17 |
International Business Machines Corporation |
Method and system for evaluating network security
|
US7346929B1
(en)
*
|
1999-07-29 |
2008-03-18 |
International Business Machines Corporation |
Method and apparatus for auditing network security
|
US8006243B2
(en)
*
|
1999-12-07 |
2011-08-23 |
International Business Machines Corporation |
Method and apparatus for remote installation of network drivers and software
|
ATE414943T1
(de)
*
|
2000-03-03 |
2008-12-15 |
Ibm |
System zur bestimmung von schwächen von web- anwendungen
|
US7200640B1
(en)
*
|
2000-03-16 |
2007-04-03 |
Cole James M |
Continuously tunable, graphic internet navigation tool
|
US20010034847A1
(en)
*
|
2000-03-27 |
2001-10-25 |
Gaul,Jr. Stephen E. |
Internet/network security method and system for checking security of a client from a remote facility
|
US6430395B2
(en)
*
|
2000-04-07 |
2002-08-06 |
Commil Ltd. |
Wireless private branch exchange (WPBX) and communicating between mobile units and base stations
|
AU2001262958A1
(en)
*
|
2000-04-28 |
2001-11-12 |
Internet Security Systems, Inc. |
Method and system for managing computer security information
|
WO2001084775A2
(en)
*
|
2000-04-28 |
2001-11-08 |
Internet Security Systems, Inc. |
System and method for managing security events on a network
|
US20050050163A1
(en)
*
|
2000-05-24 |
2005-03-03 |
Cole James M. |
Continuously tunable, graphic internet navigation tool
|
US9027121B2
(en)
|
2000-10-10 |
2015-05-05 |
International Business Machines Corporation |
Method and system for creating a record for one or more computer security incidents
|
US7146305B2
(en)
*
|
2000-10-24 |
2006-12-05 |
Vcis, Inc. |
Analytical virtual machine
|
JP2002157171A
(ja)
|
2000-11-17 |
2002-05-31 |
Canon Inc |
情報処理装置、機器管理プログラム、機器管理プログラムが格納された記録媒体、及び機器管理方法
|
US7130466B2
(en)
*
|
2000-12-21 |
2006-10-31 |
Cobion Ag |
System and method for compiling images from a database and comparing the compiled images with known images
|
US7168093B2
(en)
*
|
2001-01-25 |
2007-01-23 |
Solutionary, Inc. |
Method and apparatus for verifying the integrity and security of computer networks and implementation of counter measures
|
US20020147803A1
(en)
*
|
2001-01-31 |
2002-10-10 |
Dodd Timothy David |
Method and system for calculating risk in association with a security audit of a computer network
|
US8135815B2
(en)
*
|
2001-03-27 |
2012-03-13 |
Redseal Systems, Inc. |
Method and apparatus for network wide policy-based analysis of configurations of devices
|
US6895383B2
(en)
*
|
2001-03-29 |
2005-05-17 |
Accenture Sas |
Overall risk in a system
|
US6620995B2
(en)
*
|
2001-03-30 |
2003-09-16 |
Sergiy Victorovich Vasylyev |
Non-imaging system for radiant energy flux transformation
|
US7657419B2
(en)
*
|
2001-06-19 |
2010-02-02 |
International Business Machines Corporation |
Analytical virtual machine
|
US7003561B1
(en)
*
|
2001-06-29 |
2006-02-21 |
Mcafee, Inc. |
System, method and computer program product for improved efficiency in network assessment utilizing a port status pre-qualification procedure
|
US7228566B2
(en)
*
|
2001-07-10 |
2007-06-05 |
Core Sdi, Incorporated |
Automated computer system security compromise
|
US6986160B1
(en)
*
|
2001-08-31 |
2006-01-10 |
Mcafee, Inc. |
Security scanning system and method utilizing generic IP addresses
|
US6546493B1
(en)
*
|
2001-11-30 |
2003-04-08 |
Networks Associates Technology, Inc. |
System, method and computer program product for risk assessment scanning based on detected anomalous events
|
WO2003058451A1
(en)
*
|
2002-01-04 |
2003-07-17 |
Internet Security Systems, Inc. |
System and method for the managed security control of processes on a computer system
|
US7543056B2
(en)
|
2002-01-15 |
2009-06-02 |
Mcafee, Inc. |
System and method for network vulnerability detection and reporting
|
US7243148B2
(en)
*
|
2002-01-15 |
2007-07-10 |
Mcafee, Inc. |
System and method for network vulnerability detection and reporting
|
US7257630B2
(en)
*
|
2002-01-15 |
2007-08-14 |
Mcafee, Inc. |
System and method for network vulnerability detection and reporting
|
JP4190765B2
(ja)
*
|
2002-01-18 |
2008-12-03 |
株式会社コムスクエア |
セキュリティレベル情報提供方法及びシステム
|
US7370360B2
(en)
*
|
2002-05-13 |
2008-05-06 |
International Business Machines Corporation |
Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine
|
US7509675B2
(en)
*
|
2002-05-29 |
2009-03-24 |
At&T Intellectual Property I, L.P. |
Non-invasive monitoring of the effectiveness of electronic security services
|
US7277937B2
(en)
*
|
2002-07-17 |
2007-10-02 |
Core Sdi, Incorporated |
Distributed computing using syscall proxying
|
US6952779B1
(en)
*
|
2002-10-01 |
2005-10-04 |
Gideon Cohen |
System and method for risk detection and analysis in a computer network
|
US8407798B1
(en)
|
2002-10-01 |
2013-03-26 |
Skybox Secutiry Inc. |
Method for simulation aided security event management
|
WO2004034229A2
(en)
|
2002-10-10 |
2004-04-22 |
Rocksteady Networks, Inc. |
System and method for providing access control
|
WO2004036371A2
(en)
*
|
2002-10-16 |
2004-04-29 |
Rocksteady Networks, Inc. |
System and method for dynamic bandwidth provisioning
|
US8230497B2
(en)
*
|
2002-11-04 |
2012-07-24 |
Hewlett-Packard Development Company, L.P. |
Method of identifying software vulnerabilities on a computer system
|
US8312535B1
(en)
|
2002-12-12 |
2012-11-13 |
Mcafee, Inc. |
System, method, and computer program product for interfacing a plurality of related applications
|
US8122498B1
(en)
|
2002-12-12 |
2012-02-21 |
Mcafee, Inc. |
Combined multiple-application alert system and method
|
US8239941B1
(en)
|
2002-12-13 |
2012-08-07 |
Mcafee, Inc. |
Push alert system, method, and computer program product
|
US8990723B1
(en)
|
2002-12-13 |
2015-03-24 |
Mcafee, Inc. |
System, method, and computer program product for managing a plurality of applications via a single interface
|
US7913303B1
(en)
|
2003-01-21 |
2011-03-22 |
International Business Machines Corporation |
Method and system for dynamically protecting a computer system from attack
|
US7627891B2
(en)
*
|
2003-02-14 |
2009-12-01 |
Preventsys, Inc. |
Network audit and policy assurance system
|
US7624422B2
(en)
|
2003-02-14 |
2009-11-24 |
Preventsys, Inc. |
System and method for security information normalization
|
EP1469651A3
(en)
*
|
2003-04-17 |
2004-12-29 |
CC CompuNet Computer AG & Co. oHG |
Computer network leakage detection
|
US20070113272A2
(en)
|
2003-07-01 |
2007-05-17 |
Securityprofiling, Inc. |
Real-time vulnerability monitoring
|
US9100431B2
(en)
|
2003-07-01 |
2015-08-04 |
Securityprofiling, Llc |
Computer program product and apparatus for multi-path remediation
|
US9118710B2
(en)
|
2003-07-01 |
2015-08-25 |
Securityprofiling, Llc |
System, method, and computer program product for reporting an occurrence in different manners
|
US9118711B2
(en)
*
|
2003-07-01 |
2015-08-25 |
Securityprofiling, Llc |
Anti-vulnerability system, method, and computer program product
|
US9118709B2
(en)
|
2003-07-01 |
2015-08-25 |
Securityprofiling, Llc |
Anti-vulnerability system, method, and computer program product
|
US8984644B2
(en)
|
2003-07-01 |
2015-03-17 |
Securityprofiling, Llc |
Anti-vulnerability system, method, and computer program product
|
US9350752B2
(en)
|
2003-07-01 |
2016-05-24 |
Securityprofiling, Llc |
Anti-vulnerability system, method, and computer program product
|
US9118708B2
(en)
|
2003-07-01 |
2015-08-25 |
Securityprofiling, Llc |
Multi-path remediation
|
US7624438B2
(en)
|
2003-08-20 |
2009-11-24 |
Eric White |
System and method for providing a secure connection between networked computers
|
JP4251061B2
(ja)
*
|
2003-10-03 |
2009-04-08 |
ブリヂストンスポーツ株式会社 |
ゴルフクラブヘッド
|
US7657938B2
(en)
*
|
2003-10-28 |
2010-02-02 |
International Business Machines Corporation |
Method and system for protecting computer networks by altering unwanted network data traffic
|
US8136163B2
(en)
*
|
2004-01-16 |
2012-03-13 |
International Business Machines Corporation |
Method, apparatus and program storage device for providing automated tracking of security vulnerabilities
|
CA2553552A1
(en)
*
|
2004-02-11 |
2005-08-25 |
Spi Dynamics, Inc. |
System and method for testing web applications with recursive discovery and analysis
|
US20060282494A1
(en)
*
|
2004-02-11 |
2006-12-14 |
Caleb Sima |
Interactive web crawling
|
US7765597B2
(en)
*
|
2004-02-11 |
2010-07-27 |
Hewlett-Packard Development Company, L.P. |
Integrated crawling and auditing of web applications and web content
|
US7665130B2
(en)
*
|
2004-03-10 |
2010-02-16 |
Eric White |
System and method for double-capture/double-redirect to a different location
|
US20050204022A1
(en)
*
|
2004-03-10 |
2005-09-15 |
Keith Johnston |
System and method for network management XML architectural abstraction
|
US7610621B2
(en)
*
|
2004-03-10 |
2009-10-27 |
Eric White |
System and method for behavior-based firewall modeling
|
US7509625B2
(en)
|
2004-03-10 |
2009-03-24 |
Eric White |
System and method for comprehensive code generation for system management
|
US7590728B2
(en)
|
2004-03-10 |
2009-09-15 |
Eric White |
System and method for detection of aberrant network behavior by clients of a network access gateway
|
US8543710B2
(en)
*
|
2004-03-10 |
2013-09-24 |
Rpx Corporation |
Method and system for controlling network access
|
US8201257B1
(en)
|
2004-03-31 |
2012-06-12 |
Mcafee, Inc. |
System and method of managing network security risks
|
US7519954B1
(en)
|
2004-04-08 |
2009-04-14 |
Mcafee, Inc. |
System and method of operating system identification
|
GB2414889A
(en)
*
|
2004-04-30 |
2005-12-07 |
Hewlett Packard Development Co |
Network administration
|
US7665119B2
(en)
|
2004-09-03 |
2010-02-16 |
Secure Elements, Inc. |
Policy-based selection of remediation
|
US20060085852A1
(en)
*
|
2004-10-20 |
2006-04-20 |
Caleb Sima |
Enterprise assessment management
|
US20060101517A1
(en)
*
|
2004-10-28 |
2006-05-11 |
Banzhof Carl E |
Inventory management-based computer vulnerability resolution system
|
JP4551866B2
(ja)
*
|
2005-12-07 |
2010-09-29 |
株式会社リコー |
通信システムおよび呼制御サーバ装置およびプログラム
|
JP2007249579A
(ja)
*
|
2006-03-15 |
2007-09-27 |
Fujitsu Ltd |
ワーム対策パラメータ決定プログラム、ワーム対策パラメータ決定装置、ノード数決定プログラム、ノード数決定装置およびノード数制限システム
|
US20080183626A1
(en)
*
|
2007-01-31 |
2008-07-31 |
Francisco Romero |
Software license agreement management based on temporary usage
|
US20090038014A1
(en)
*
|
2007-07-31 |
2009-02-05 |
Paul Force |
System and method for tracking remediation of security vulnerabilities
|
US8037536B2
(en)
*
|
2007-11-14 |
2011-10-11 |
Bank Of America Corporation |
Risk scoring system for the prevention of malware
|
KR20090121579A
(ko)
*
|
2008-05-22 |
2009-11-26 |
주식회사 이베이지마켓 |
서버의 취약점을 점검하기 위한 시스템 및 그 방법
|
KR101225870B1
(ko)
*
|
2010-06-07 |
2013-01-24 |
삼성에스디에스 주식회사 |
안티 멀웨어 시스템 및 그의 동작 방법
|
JP5425840B2
(ja)
|
2010-06-07 |
2014-02-26 |
サムソン エスディーエス カンパニー リミテッド |
アンチマルウェアシステム及びその動作方法
|
US8365287B2
(en)
*
|
2010-06-18 |
2013-01-29 |
Samsung Sds Co., Ltd. |
Anti-malware system and operating method thereof
|
US8918785B1
(en)
*
|
2010-12-29 |
2014-12-23 |
Amazon Technologies, Inc. |
Managing virtual machine network through security assessment
|
US8745734B1
(en)
|
2010-12-29 |
2014-06-03 |
Amazon Technologies, Inc. |
Managing virtual computing testing
|
EP2500838A1
(en)
|
2011-03-16 |
2012-09-19 |
Samsung SDS Co. Ltd. |
SOC-based device for packet filtering and packet filtering method thereof
|
US10341509B2
(en)
*
|
2013-02-24 |
2019-07-02 |
Qualys, Inc. |
Client device state collection and network-based processing solution
|
US9246935B2
(en)
|
2013-10-14 |
2016-01-26 |
Intuit Inc. |
Method and system for dynamic and comprehensive vulnerability management
|
US9313281B1
(en)
|
2013-11-13 |
2016-04-12 |
Intuit Inc. |
Method and system for creating and dynamically deploying resource specific discovery agents for determining the state of a cloud computing environment
|
US9501345B1
(en)
|
2013-12-23 |
2016-11-22 |
Intuit Inc. |
Method and system for creating enriched log data
|
US9323926B2
(en)
|
2013-12-30 |
2016-04-26 |
Intuit Inc. |
Method and system for intrusion and extrusion detection
|
US20150304343A1
(en)
|
2014-04-18 |
2015-10-22 |
Intuit Inc. |
Method and system for providing self-monitoring, self-reporting, and self-repairing virtual assets in a cloud computing environment
|
US9325726B2
(en)
|
2014-02-03 |
2016-04-26 |
Intuit Inc. |
Method and system for virtual asset assisted extrusion and intrusion detection in a cloud computing environment
|
US10757133B2
(en)
|
2014-02-21 |
2020-08-25 |
Intuit Inc. |
Method and system for creating and deploying virtual assets
|
US9866581B2
(en)
|
2014-06-30 |
2018-01-09 |
Intuit Inc. |
Method and system for secure delivery of information to computing environments
|
US9276945B2
(en)
*
|
2014-04-07 |
2016-03-01 |
Intuit Inc. |
Method and system for providing security aware applications
|
US9419986B2
(en)
*
|
2014-03-26 |
2016-08-16 |
Symantec Corporation |
System to identify machines infected by malware applying linguistic analysis to network requests from endpoints
|
US9245117B2
(en)
|
2014-03-31 |
2016-01-26 |
Intuit Inc. |
Method and system for comparing different versions of a cloud based application in a production environment using segregated backend systems
|
US11294700B2
(en)
|
2014-04-18 |
2022-04-05 |
Intuit Inc. |
Method and system for enabling self-monitoring virtual assets to correlate external events with characteristic patterns associated with the virtual assets
|
US9374389B2
(en)
|
2014-04-25 |
2016-06-21 |
Intuit Inc. |
Method and system for ensuring an application conforms with security and regulatory controls prior to deployment
|
US9900322B2
(en)
|
2014-04-30 |
2018-02-20 |
Intuit Inc. |
Method and system for providing permissions management
|
US9319415B2
(en)
|
2014-04-30 |
2016-04-19 |
Intuit Inc. |
Method and system for providing reference architecture pattern-based permissions management
|
US9330263B2
(en)
|
2014-05-27 |
2016-05-03 |
Intuit Inc. |
Method and apparatus for automating the building of threat models for the public cloud
|
US9473481B2
(en)
|
2014-07-31 |
2016-10-18 |
Intuit Inc. |
Method and system for providing a virtual asset perimeter
|
US10102082B2
(en)
|
2014-07-31 |
2018-10-16 |
Intuit Inc. |
Method and system for providing automated self-healing virtual assets
|
US10264008B2
(en)
|
2015-10-08 |
2019-04-16 |
Bank Of America Corporation |
Vulnerability exposing application characteristic variation identification engine
|
US11196762B2
(en)
|
2019-07-31 |
2021-12-07 |
International Business Machines Corporation |
Vulnerability scanner based on network profile
|